Skip to content

Commit 8118dd2

Browse files
Merge pull request #216881 from yelevin/yelevin/nrt-fixes
Fixing some mistaken information
2 parents 11e72e6 + 47948ba commit 8118dd2

File tree

3 files changed

+7
-9
lines changed

3 files changed

+7
-9
lines changed

articles/sentinel/create-nrt-rules.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,8 @@ title: Work with near-real-time (NRT) detection analytics rules in Microsoft Sen
33
description: This article explains how to view and create near-real-time (NRT) detection analytics rules in Microsoft Sentinel.
44
author: yelevin
55
ms.topic: how-to
6-
ms.date: 11/09/2021
6+
ms.date: 11/02/2022
77
ms.author: yelevin
8-
ms.custom: ignite-fall-2021
98
---
109
# Work with near-real-time (NRT) detection analytics rules in Microsoft Sentinel
1110

@@ -35,15 +34,15 @@ You create NRT rules the same way you create regular [scheduled-query analytics
3534

3635
1. From the Microsoft Sentinel navigation menu, select **Analytics**.
3736

38-
1. Select **Create** from the button bar, then **NRT query rule** from the drop-down list.
37+
1. Select **Create** from the button bar, then **NRT query rule (preview)** from the drop-down list.
3938

40-
:::image type="content" source="media/create-nrt-rules/create-nrt-rule.png" alt-text="Create a new NRT rule.":::
39+
:::image type="content" source="media/create-nrt-rules/create-nrt-rule.png" alt-text="Screenshot shows how to create a new NRT rule." lightbox="media/create-nrt-rules/create-nrt-rule.png":::
4140

4241
1. Follow the instructions of the [**analytics rule wizard**](detect-threats-custom.md).
4342

4443
The configuration of NRT rules is in most ways the same as that of scheduled analytics rules.
4544

46-
- You can refer to [**watchlists**](watchlists.md) and [**threat intelligence feeds**](understand-threat-intelligence.md) in your query logic.
45+
- You can refer to [**watchlists**](watchlists.md) in your query logic.
4746

4847
- You can use all of the alert enrichment methods: [**entity mapping**](map-data-fields-to-entities.md), [**custom details**](surface-custom-details-in-alerts.md), and [**alert details**](customize-alert-details.md).
4948

@@ -69,5 +68,5 @@ You create NRT rules the same way you create regular [scheduled-query analytics
6968

7069
In this document, you learned how to create near-real-time (NRT) analytics rules in Microsoft Sentinel.
7170

72-
- Learn more about about [near-real-time (NRT) analytics rules in Microsoft Sentinel](near-real-time-rules.md).
71+
- Learn more about [near-real-time (NRT) analytics rules in Microsoft Sentinel](near-real-time-rules.md).
7372
- Explore other [analytics rule types](detect-threats-built-in.md).
9.19 KB
Loading

articles/sentinel/near-real-time-rules.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,8 @@ title: Detect threats quickly with near-real-time (NRT) analytics rules in Micro
33
description: This article explains how the new near-real-time (NRT) analytics rules can help you detect threats quickly in Microsoft Sentinel.
44
author: yelevin
55
ms.topic: conceptual
6-
ms.date: 11/09/2021
6+
ms.date: 11/02/2022
77
ms.author: yelevin
8-
ms.custom: ignite-fall-2021
98
---
109
# Detect threats quickly with near-real-time (NRT) analytics rules in Microsoft Sentinel
1110

@@ -40,7 +39,7 @@ The following limitations currently govern the use of NRT rules:
4039

4140
1. As this type of rule is new, its syntax is currently limited but will gradually evolve. Therefore, at this time the following restrictions are in effect:
4241

43-
1. The query defined in an NRT rule can reference **only one table**. Queries can, however, refer to multiple watchlists and to threat intelligence feeds.
42+
1. The query defined in an NRT rule can reference **only one table**. Queries can, however, refer to multiple watchlists.
4443

4544
1. You cannot use unions or joins.
4645

0 commit comments

Comments
 (0)